By Topic

Service-Oriented System Engineering, 2006. SOSE '06. Second IEEE International Workshop

Date 25-26 Oct. 2006

Filter Results

Displaying Results 1 - 25 of 38
  • Second IEEE International Symposium on Service-Oriented System Engineering - Cover

    Publication Year: 2006 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (294 KB)  
    Freely Available from IEEE
  • Second IEEE International Symposium on Service-Oriented System Engineering - Title

    Publication Year: 2006 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • Second IEEE International Symposium on Service-Oriented System Engineering - Copyright

    Publication Year: 2006 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (43 KB)  
    Freely Available from IEEE
  • Second IEEE International Symposium on Service-Oriented System Engineering - TOC

    Publication Year: 2006 , Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (46 KB)  
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2006 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (27 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2006 , Page(s): ix
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Committees

    Publication Year: 2006 , Page(s): x - xii
    Save to Project icon | Request Permissions | PDF file iconPDF (35 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2006 , Page(s): xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (23 KB)  
    Freely Available from IEEE
  • Perspectives on Service-Oriented Computing and Service-Oriented System Engineering

    Publication Year: 2006 , Page(s): 3 - 10
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (189 KB) |  | HTML iconHTML  

    The service-oriented computing (SOC) paradigm leads the innovation of today's computing system and software development, and it can transform the human society into a new republic of all-to-all connected world. There are a number of interesting and innovative research challenges involved in achieving this vision of service-oriented system engineering (SOSE). This paper highlights some of these significant research opportunities and also the need for enhanced education in this emerging area View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Oriented Evolutions and Analyses of Design Patterns

    Publication Year: 2006 , Page(s): 11 - 18
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (451 KB) |  | HTML iconHTML  

    The globalization of software development helps to reduce business cost by outsourcing software design and development tasks. However, it also poses new challenges on the collaboration and management of the development teams at multiple remote sites. Service-oriented approaches facilitate Web-based collaborations and reuses. In this paper, we propose a service-oriented architecture for the collaboration of software design teams in distributed locations. In particular, our approach allows different design teams from multiple remote sites to design software systems with design patterns, to evolve the designs, and to check the consistencies of the design evolutions. We provide service-oriented prototype tools for the design teams from different physical locations to model the software system designs in UML, to evolve the designs based on XSLT transformations, and to check the consistencies based on the Java theorem prover. A case study is presented to illustrate our approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Engineering Design Patterns

    Publication Year: 2006 , Page(s): 19 - 26
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (280 KB) |  | HTML iconHTML  

    Design of service-oriented applications differs from design of the component-based applications in granularity, level of abstraction and dynamic environment in which binding between clients and servers takes place. Service engineering design patterns are introduced as "best practice solutions" to common recurring problems that designers face when developing service-based applications. Design aspects that are covered are service access, communication, security, dynamic configuration and interaction (composition). The goal is to introduce a disciplined method for development of service-oriented applications View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service-Orientation in the Computing Infrastructure

    Publication Year: 2006 , Page(s): 27 - 33
    Cited by:  Papers (12)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (444 KB) |  | HTML iconHTML  

    This paper discusses service-orientation concepts applied to infrastructure orchestration and management. It discusses the concept of service-oriented infrastructure (SOI) and illustrates examples of end-to-end infrastructure services including services provisioned at the bare-metal hardware level. This paper demonstrates the potential to make platform as a service (PaaS) and its value to the IT infrastructure management View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Threshold Autoregressive Model for Software Aging

    Publication Year: 2006 , Page(s): 34 - 40
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (322 KB) |  | HTML iconHTML  

    Long running software systems such as client-server type systems are known to experience a kind of aging phenomenon called software aging, one in which the accumulation of errors during the execution of software leads to performance degradation and eventually results in failure. To study and counteract the phenomenon of software aging, we collect and log data on several system resource usage and activity parameters of a Web server. Based on the experimental results, we argue that software aging process could be divided into four stages: robust stage, transition stage, failure-probable stage and failure stage. A non-linear threshold autoregressive (TAR) model is then proposed to model and forecast the resource usage in these stages. In comparison with AR model, TAR model is more accurate View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Infrastructure for Web Services Migration for Real-Time Applications

    Publication Year: 2006 , Page(s): 41 - 48
    Cited by:  Papers (10)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (283 KB) |  | HTML iconHTML  

    Service-oriented architecture (SOA) is a highly promising technology for software development. It can greatly reduce the development time and cost and achieve system agility. Web service is the current practice for realizing SOA. Due to the nature of widely distributed Web service providers, the service performance could be impacted when the network traffic is congested. There are methods, such as communication cost based service selection strategies, developed to cope with the problem. In this paper, we propose a complementing technology, migratable Web services, to overcome the performance problems for real-time applications. A service can be implemented by multiple light weighted Web services and some of them can be migrated to strategic sites to minimize the communication delays so the real-time requirements can be met. We have designed an infrastructure to support Web service migration and execution. Also, appropriate decision mechanism, which decides whether a Web service should be migrated and where to send it to, is the key for major performance gains. We use genetic algorithm to efficiently make the best migration decisions. Experimental studies show that the approach can achieve significant performance improvement View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RTSOA: Real-Time Service-Oriented Architecture

    Publication Year: 2006 , Page(s): 49 - 56
    Cited by:  Papers (13)  |  Patents (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (321 KB) |  | HTML iconHTML  

    This paper extends the traditional service-oriented architecture (SOA) to a new real-time SOA (RTSOA) and proposes a framework for the new architecture, by providing real-time service modeling, design, code generation, simulation, deployment, execution, orchestration, and management. The concepts, architecture, and enabling technique are studied for real-time SOA. In addition, an efficient algorithm is derived in the paper to find the optimal composition of real-time services subject to the real-time constraint View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Tuple-Space-Based Coordination Architecture for Test Agents in the MAST Framework

    Publication Year: 2006 , Page(s): 57 - 66
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (333 KB) |  | HTML iconHTML  

    Service-oriented architecture (SOA) is becoming the mainstream of distributed system integration. Trustworthiness is critical for cross-domain service interaction, and testing is necessary to build the trust among the different parties involved in SOA. MAST, a multi-agent-based service testing framework, was proposed for testing service-based applications in our previous work. This paper further explores the agent coordination issues in the MAST framework to address the challenge of effective agent communication and interaction. A hybrid coordination architecture is presented which combines data-driven and control-driven models based on the reactive tuple space technique. Different tuple spaces are introduced to facilitate data sharing and asynchronous coordination among test agents. A subscription mechanism is introduced to associate programmable reactions to the events occurred and state changes on the tuple space. The mobile agent technique is also introduced to implement the test agents, which are created on line carrying the tasks, and migrate to the host computers to execute various tasks. A prototype system is designed and implemented to illustrate the proposed approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy Assessment Approach for Serviced Oriented Architecture Application

    Publication Year: 2006 , Page(s): 67 - 75
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (255 KB) |  | HTML iconHTML  

    Web services are middle-tier technologies used to access backend applications to perform various operations. Their usage has significantly increased in e-commerce applications since their introduction. Because of their wide usage, security in Web services has become an important point of interest for many. User data provided by users during their transactions with online Web services can be stolen and illegally used. Thus Web service providers have started to strengthen security. This can lead to lack of user privacy. Privacy has received relatively less attention during the growth of information technology. User privacy management needs to be both from the user side and from Web application side. User awareness about information security is the factor for user side privacy management. On the application side, the Web applications must be compliant to privacy policies. In this paper, an approach is designed and implemented for a privacy policy checker engine that automatically verifies and certifies a Web service application based on the levels of overall privacy principle compliance and privacy statement compliance View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation Issues of Authorization Mechanisms in Grid Computing Systems

    Publication Year: 2006 , Page(s): 76 - 80
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (123 KB) |  | HTML iconHTML  

    This paper analyzes the requirement of authorization service for grid computing systems and proposes the use of threshold closure as a basic mechanism for implementing authorization service in grid computing systems. While pointing out the desirable features of threshold closure for complex authorization policies, the paper also discusses the practical limitations of threshold closure in such an environment, and then puts forward a new authorization service for virtual organization. In addition, an access control protocol which is based on PKI is designed in the paper. By segregating the policy and mechanism aspects of threshold closure, the new service can use existing security infrastructure in grid computing system while keep the ability to express complex authorization policy effectively View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Descriptions ofWeb Services Security Constraints

    Publication Year: 2006 , Page(s): 81 - 84
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (104 KB) |  | HTML iconHTML  

    Non-functional descriptions of web services and business rules play an important role in specification and analysis of the security constraints of Web services. As existing approaches do not provide logic and semantic model for the web services security constraints, sharing and reasoning over them are infeasible. The proposal builds upon the project AKT's work in defining a Semantic Web Constraint Interchange Format (CIF), which itself builds on the proposed Semantic Web Rule Language (SWRL). The main contributions of this paper are a new ontology for representing security constraints as policy and a semantic policy framework for the management of the policies; we also show the possibility to integrate the business rules and non-functional descriptions into policy specification by means of converting them into constraint satisfaction problem (CSP) using CIF View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delegation Models in Service Oriented Systems

    Publication Year: 2006 , Page(s): 85 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (204 KB) |  | HTML iconHTML  

    This paper introduces service delegation modeling framework based on the strategic actors concept of the i* framework. We argue that this modeling approach together with reasoning mechanisms offers a potentially more substantive approach to understand the nature of delegation behavior in the service setting. Furthermore, we hope that understanding the underlying assumptions and constructs through the use of the delegation modeling framework will not only inform analysts of a better design for delegation mechanisms, but also assist in the understanding of intricate situations in which different delegation scenarios appear. We present a content service delegation scenario as a proof-of-concept example to illustrate the proposed approach View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modelling Quality of Service in Service Oriented Computing

    Publication Year: 2006 , Page(s): 95 - 101
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (416 KB) |  | HTML iconHTML  

    The ability to gauge quality of service is critical if we are to realise the potential of the service-oriented computing paradigm. Many techniques have been proposed for calculating the quality of a service, and they do so typically by collecting quality ratings from the users of the service, then combining them in one way or another to derive the quality of the service. We argue that combining quality ratings in such a way may lead to inaccurate quality measures for services. This is because different users often have different expectations on the quality of a service and their ratings tend to be closely related to these expectations, i.e. how their expectations are met. In this paper, we propose a fuzzy based quality of service assessment model based on user expectations. That is, we collect expectations as well as ratings from the users of a service, then calculate the quality of the service based on the ratings that have similar expectations. We give examples to show that our approach can result in a more accurate and meaningful measure for quality of service View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis, Design and Implementation of Exception Handling in WWW Services

    Publication Year: 2006 , Page(s): 102 - 109
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (571 KB) |  | HTML iconHTML  

    WWW (World Wide Web) has become the richest resource pool of services and information. By integrating the existing independent services in WWW, users can compose and create abundant new services, such as stock alert service, automatic trading service. Due to the characteristics of Internet - wide-area distribution, lack of referential integrity and no quality of service, how to assure the reliability and accuracy of execution of new composed services is very important and indispensable. In this paper, we analyze the possible causes of exceptions and their solutions in WWW service integration and then design and implement the exception handling mechanisms in our WWW service integration tool View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending SOA to Cover Unreliable Services on Internet

    Publication Year: 2006 , Page(s): 110 - 116
    Cited by:  Patents (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (101 KB) |  | HTML iconHTML  

    In this paper, we would like to address the problem of using unreliable, yet valuable services in SOA design. We first give a new classification of services based on their service QoS levels and their deployment modes. Then, instead of driving for higher QoS level from a single service, we achieve the same goal through the concept of "service community". Both the system design issues and the corresponding architecture are given. The importance of this new architecture is that valuable but unreliable services on Internet can now be used as components in SOA just like those high QoS ones, but with a substantially lower cost View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chaotic Analysis of Software Aging in Web Server

    Publication Year: 2006 , Page(s): 117 - 120
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (223 KB) |  | HTML iconHTML  

    Recently, a kind of phenomenon known as software aging has been reported in many studies, characterized by progressive performance degradation or abrupt crash/hang. Software aging is directly related to resources usage. In this paper, we set up an experimental platform with multi-clients, collect data on system resource usage on Web server and log data on performance on client. It is observed that there is performance degradation while the amount of available memory remains constant. Results show that there is significant correlation between response time and buffer. Finally, we calculate the largest Lyapunov exponent of time series of average load, and results show that software aging process is chaotic View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring Component-Based Systems Using a Systematic Approach and Environment

    Publication Year: 2006 , Page(s): 121 - 129
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (887 KB) |  | HTML iconHTML  

    SOA applications are developed to implement service-oriented workflows with service specifications. Most SOA applications are made of service-oriented components, which are built using standard specifications and interaction protocols. How to validate system performance and measure the non-function requirements and behaviors in a component-based SOA application becomes a challenge for engineer. This paper focuses on the measurement of the component-based SOA systems in terms of service-oriented process speed, system reliability, throughput, and availability. The paper proposes a systematic solution to support the system level measurement for component-based SOA software, which extends our previous component level performance measurement. The paper presents a systematic solution using an event-based functional transition model as a performance evaluation model, and its evaluation metrics, such as system processing time, throughput, availability and reliability. It reports the basic functions and design of this solution, also presents a case study and application results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.